TryHackMe - Windows Forensics 1 
- Hands-on Challenge
Peachaya Tanomsup

TryHackMe - Windows Forensics 1 - Hands-on Challenge

  • We will identify where the different files for the relevant registry hives are located and load them into Registry Explorer for analysis.

Scenario Notes:

  • One of the Desktops in the research lab at Organization X is suspected to have been accessed by someone unauthorized.
  • Although they generally have only one user account per Desktop, there were multiple user accounts observed on this system.
  • It is also suspected that the system was connected to some network drive, and a USB device was connected to the system
  • The triage data from the system was collected and placed on the attached?VM

Open the EZTools folder on the desktop, then navigate to the RegistryExplorer application file and double click it to run it:

No alt text provided for this image

Questions:

To load the needed hives click File > Load hive:

No alt text provided for this image

Go to Desktop\triage\C\Windows\System32\config.

Select the SAM hive.

No alt text provided for this image

In Registry Explorer go to SAM\Domain\Account\Users

No alt text provided for this image

Question 1:

How many user created accounts are present on the system?

Answer:

3

Explanation:

Look back at the “System Information and System Accounts” task

We see a built in account, a default account, and a utility account. Looks like the other 3 accounts were user-created.

No alt text provided for this image

Question 2:

What is the username of the account that has never been logged in?

Answer:

thm-user2

Explanation:

Expand the Last Login Time column to see that thm-user2 has no data.

No alt text provided for this image

Question 3:

What's the password hint for the user THM-4n6?

Answer:

count

Explanation:

Expand the Password Hint column

No alt text provided for this image

Question 4:

When was the file 'Changelog.txt' accessed?

Answer:

2021-11-24 18:18:48

Explanation:

From task “Usage or knowledge of files/folders” we see that info about recent files is stored here:

NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs

Load the following hive in Registry Explorer:

Desktop\triage\C\Users\THM-4n6\NTUSER.DAT

No alt text provided for this image

In the NTUSER.DAT hive go to: Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs\.txt

See the Opened On column.

No alt text provided for this image

Question 5:

What is the complete path from where the python 3.8.2 installer was run?

Answer:

z:\setups\python-3.8.2.exe

Explanation:

Refer to task “Evidence of Execution”

The following location has info regarding programs launched, the time of their launch, and the number of times they were executed:

NTUSER.DAT\Software\Microsoft\Windows\Currentversion\Explorer\UserAssist\{GUID}\Count

No alt text provided for this image

Question 6:

When was the USB device with the friendly name 'USB' last connected?

Answer:

2021-11-24 18:40:06

Explanation:

From Task “External Devices/USB device forensics” we can that info about USB keys plugged into a system is stored here:

SYSTEM\\CurrentControlSet\\Enum\\USBSTOR

-AND-

SYSTEM\\CurrentControlSet\\Enum\\USB

Load this hive in Registry Explorer:

Desktop\triage\C\Windows\System32\config\SYSTEM

No alt text provided for this image

Click yes

No alt text provided for this image

Click ok

No alt text provided for this image

Choose SYSTEM.LOG1 and click open

No alt text provided for this image

Click ok

No alt text provided for this image

Click Save

No alt text provided for this image

Click yes

No alt text provided for this image

Click no

No alt text provided for this image

The hive can be found in Registry Explorer now

No alt text provided for this image

Load the SOFTWARE hive into Registry Explorer

Follow this path and find the Device with friendly name USB:

SOFTWARE\Microsoft\Windows Portable Devices\Devices

Take note of the GUID

No alt text provided for this image

Go back to SYSTEM\CurrentControlSet\Enum\USBSTOR

Here, we can see when the device with the matching ID was last connected

No alt text provided for this image
Jamel Williams

Cyber Security Specialist | Technical Support Specialist| Technical Account Manager

2 年

Thanks for posting

要查看或添加评论,请登录

Octavious W.的更多文章

  • Internet Browser Forensics with Autopsy

    Internet Browser Forensics with Autopsy

    In this lab we learned how to access web browser history from Windows computers and how to use that data in an…

  • SQL Injection Lab

    SQL Injection Lab

    TOPICS: Basic SQL Commands Querying a database with SQL Deleting data with SQL SQL Injection Techniques Basic SQL…

  • Web Hacking Lab

    Web Hacking Lab

    TOPICS Web Application Vulnerability Scanning With Nikto Burp Suite setup Using Burp Suite to build a site map Brute…

    3 条评论
  • Metasploit Review Lab

    Metasploit Review Lab

    TOPICS: Getting Familiar with Metasploit Vulnerability Scanning with WMAP Configuring Exploits and Payloads Getting…

    5 条评论
  • System Hardening

    System Hardening

    System hardening is the process of making changes to a system or application to make it more secure than it’s default…

    2 条评论
  • I went to Bsides Atlanta!

    I went to Bsides Atlanta!

    I had an amazing experience at BSides Atlanta 2023! Here are my highlights and takeaways of the day! My morning started…

    5 条评论
  • Reconnaissance

    Reconnaissance

    What is Reconnaissance? Reconnaissance is the process hackers use to gather as much information as possible about their…

    7 条评论
  • Logging for Cyber Security

    Logging for Cyber Security

    Here are some notes I took on Logging during my Security+ exam prep. Logs form detailed lists of activities related to…

    6 条评论
  • TryHackMe - New Hire Old Artifacts - Notes

    TryHackMe - New Hire Old Artifacts - Notes

    Scenario Notes: Widget LLC has some concerns with the endpoints in the Finance Dept. Especially an endpoint for a…

  • TryHackMe KAPE Hands-on Challenge

    TryHackMe KAPE Hands-on Challenge

    We will use the forensics tool KAPE to collect and process files from a device Scenario Notes: Organization X’s…

    1 条评论

社区洞察

其他会员也浏览了